Preferred Language
Articles
/
injns-259
Detection of Polyomavirus BK and JC in kidney Transplant Recipients
...Show More Authors

objectives: To investigate the polyomaviruses (BK, JC) in asymptomatic kidney transplant recipients and healthy persons as control. It is one of the first reports on serological detection and molecular characterization that describes the circulation of polyomaviruses (BKV, JCV) have been done in Iraq recently. Methodology: The present study was designed as prospective case control study was done during the period from November 2015 to August 2016. Total of 97 serum and urine samples were collected randomly from 25 healthy control person and 72 renal transplant recipients, attending Iraqi Renal Transplantation Society. “New experimental indirect ELISA kit" had been designed and synthesized manually for detection Anti-JCV IgM and IgG, Urea and creatinine level had been measured for total study groups for estimation of renal functions. Results: All of the samples were submitted to a Nested-PCR. A significantly difference had been seen (P < 0.01) of PyV was found in renal transplant patients 2(2.8%) in comparison to the control group 4(16.0%). JCV was detected in.6 (6.2%) samples (2 patients/ 4 controls).by conventional PCR, BKV was detected in 2(2.8%) of renal transplant group and not detected with any one of control group. result for IgM revealed positivity for 25(25.8%) out of 72cases of renal transplant subject and 8(8.2%) person out of 25control groups. for IgG the result show that 21(29.2%) out of 72 cases of renal transplant Subjects have a positive result for IgG but this antibody was not detected in the control. Recommendations: Success diagnosis required sensitive assay typically Nested-PCR to detect extremely low viral load present in potential kidney donor before access as a donor, Because of the potentially harmful effects of polyomavirus which may cause loss of the transplanted kidney

 
 

 

View Publication Preview PDF
Quick Preview PDF
Publication Date
Wed Dec 18 2019
Journal Name
Baghdad Science Journal
Detecting Keratoconus by Using SVM and Decision Tree Classifiers with the Aid of Image Processing
...Show More Authors

 Researchers used different methods such as image processing and machine learning techniques in addition to medical instruments such as Placido disc, Keratoscopy, Pentacam;to help diagnosing variety of diseases that affect the eye. Our paper aims to detect one of these diseases that affect the cornea, which is Keratoconus. This is done by using image processing techniques and pattern classification methods. Pentacam is the device that is used to detect the cornea’s health; it provides four maps that can distinguish the changes on the surface of the cornea which can be used for Keratoconus detection. In this study, sixteen features were extracted from the four refractive maps along with five readings from the Pentacam software. The

... Show More
View Publication Preview PDF
Scopus (12)
Crossref (3)
Scopus Clarivate Crossref
Publication Date
Sun Mar 01 2020
Journal Name
Journal Of Accounting And Financial Studies ( Jafs )
The Effectiveness of Quantitative Instruments in Controlling Money Supply: An Applied Research in the Central Bank of Iraq
...Show More Authors

This research deals with the role of quantitative (indirect) tools of monetary policy that used by the Central Bank of Iraq in order to control and manage the size of the money supply that intermediate goal through which monetary policy is able to achieve its final goals, foremost among which is to reduce inflation and raise the value of the local currency in front of foreign currency rates. The research is based on a major hypothesis stating that quantitative tools have a direct and strong influence on the money supply, especially under the circumstances of the shift towards a market economy. There has been a branching relationship with this statistically significant relationship between the money supply and the quantitative tools used

... Show More
View Publication Preview PDF
Publication Date
Sun Nov 01 2020
Journal Name
2020 2nd Annual International Conference On Information And Sciences (aicis)
An Enhanced Multi-Objective Evolutionary Algorithm with Decomposition for Signed Community Detection Problem
...Show More Authors

View Publication
Scopus (4)
Crossref (1)
Scopus Crossref
Publication Date
Sun Apr 30 2023
Journal Name
Iraqi Journal Of Science
An Evolutionary Algorithm with Gene Ontology-Aware Crossover Operator for Protein Complex Detection
...Show More Authors

     Evolutionary algorithms (EAs), as global search methods, are proved to be more robust than their counterpart local heuristics for detecting protein complexes in protein-protein interaction (PPI) networks. Typically, the source of robustness of these EAs comes from their components and parameters. These components are solution representation, selection, crossover, and mutation. Unfortunately, almost all EA based complex detection methods suggested in the literature were designed with only canonical or traditional components. Further, topological structure of the protein network is the main information that is used in the design of almost all such components. The main contribution of this paper is to formulate a more robust E

... Show More
Scopus (3)
Scopus Crossref
Publication Date
Sat Nov 02 2013
Journal Name
Ibn Al-haitham Journal For Pure And Applied Science
Images Segmentation Based on Fast Otsu Method Implementing on Various Edge Detection Operators
...Show More Authors

Publication Date
Fri Nov 01 2019
Journal Name
2019 1st International Informatics And Software Engineering Conference (ubmyk)
Radial Basis Function (RBF) Based on Multistage Autoencoders for Intrusion Detection system (IDS)
...Show More Authors

In this paper, RBF-based multistage auto-encoders are used to detect IDS attacks. RBF has numerous applications in various actual life settings. The planned technique involves a two-part multistage auto-encoder and RBF. The multistage auto-encoder is applied to select top and sensitive features from input data. The selected features from the multistage auto-encoder is wired as input to the RBF and the RBF is trained to categorize the input data into two labels: attack or no attack. The experiment was realized using MATLAB2018 on a dataset comprising 175,341 case, each of which involves 42 features and is authenticated using 82,332 case. The developed approach here has been applied for the first time, to the knowledge of the authors, to dete

... Show More
View Publication
Scopus (2)
Crossref (2)
Scopus Crossref
Publication Date
Sat Apr 01 2023
Journal Name
Baghdad Science Journal
Interior Visual Intruders Detection Module Based on Multi-Connect Architecture MCA Associative Memory
...Show More Authors

Most recent studies have focused on using modern intelligent techniques spatially, such as those
developed in the Intruder Detection Module (IDS). Such techniques have been built based on modern
artificial intelligence-based modules. Those modules act like a human brain. Thus, they should have had the
ability to learn and recognize what they had learned. The importance of developing such systems came after
the requests of customers and establishments to preserve their properties and avoid intruders’ damage. This
would be provided by an intelligent module that ensures the correct alarm. Thus, an interior visual intruder
detection module depending on Multi-Connect Architecture Associative Memory (MCA)

... Show More
View Publication Preview PDF
Scopus Crossref
Publication Date
Thu Mar 09 2017
Journal Name
Ibn Al-haitham Journal For Pure And Applied Sciences
Images Segmentation Based on Fast Otsu Method Implementing on Various Edge Detection Operators
...Show More Authors

The present work aims to study the effect of using an automatic thresholding technique to convert the features edges of the images to binary images in order to split the object from its background, where the features edges of the sampled images obtained from first-order edge detection operators (Roberts, Prewitt and Sobel) and second-order edge detection operators (Laplacian operators). The optimum automatic threshold are calculated using fast Otsu method. The study is applied on a personal image (Roben) and a satellite image to study the compatibility of this procedure with two different kinds of images. The obtained results are discussed.

View Publication Preview PDF
Publication Date
Sun Oct 07 2012
Journal Name
Journal Of Educational And Psychological Researches
Job Satisfaction Among Faculty Members At The University Of Irbid College
...Show More Authors

This study measured and analyzed job satisfaction among faculty members at the university of Irbid College in relation to gender social status, years of experience, academic rank , qualification, the population consisted of 110 full-time Jordanian factually members. A total of 72. (61%) factually, members participated in this study. The research instrument which was developed by the researcher consisted of tow parts: personal information and the job Satisfaction Questionnaire Frequencies, percentages, means and one-way analyses of variance were employed to analyze the data. The level of significance was set at 0.05. A Secheffe method of multiple comparisons was used for follow-up investigation.      

... Show More
View Publication Preview PDF
Publication Date
Thu Sep 30 2021
Journal Name
College Of Islamic Sciences
Islam's position on freedom according to John Stuart Mill
...Show More Authors

The issue of freedom is the most prominent and distinctive issue of Western thought, which it reached after a long struggle. The English thinker John Stuart Mill is considered the most prominent Western thinker who elaborated on the issue of freedom, until his ideas on the issue of freedom became the semi-final formula for issues of freedom in Western thought, which revolve in their entirety on The individual has complete freedom as long as it does not harm others, and this freedom is controlled by law.

And if the freedoms he offered were not considered an achievement in Western thought; Freedom in Islam is a central and fundamental issue, and the details of freedoms in Islam have not been accomplished by anyone, but rather came

... Show More
View Publication Preview PDF